啟動項目/檔案/命令名稱
程式分類
描述
Ewth ([path to tasn.exe])
絕對不需要的程式
Detected by Symantec as Adware.PurityScan - also see the archived version of Andrew Clover's page
explorer ([path to trojan])
絕對不需要的程式
Detected by Sophos as Troj/Agent-EU and by Malwarebytes as Trojan.Agent. Note - this entry loads from HKCU\Policies\Explorer\Run and filenames include system.exe, libHide.dll, systemup.exe and vbstub.exe
Experience Software Reports TPM Portable ([path to trojan])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Downloader.RND - see an example here
element furth ([path] repcale.exe [path] palsp.exe)
絕對不需要的程式
Added by a variant of the RANDON.AN WORM! Both files are often located in %System%\vert
evo ([path to windns.exe])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Banker. The file location is typically %ProgramFiles%\[various] - see examples here and here
elitemedia ([path to trojan])
絕對不需要的程式
Detected by Sophos as Troj/LowZone-BB. Also known as Elitebar/EliteToolbar/EliteSidebar adware
explorer ([path to troll.exe])
絕對不需要的程式
Detected by Dr.Web as Trojan.KillProc.16258 and by Malwarebytes as Trojan.Agent
Espadres ([path to trojan])
絕對不需要的程式
Detected by Malwarebytes as Trojan.Agent.ESGen - see an example here
ezLife ([random name].dll)
絕對不需要的程式
Detected by Symantec as Adware.EZLife and by Malwarebytes as Adware.Ezlife
eMCryT Sh3ars Panagers ([random filename])
絕對不需要的程式
Detected by Sophos as W32/Rbot-AWI. The file is located in %System%
eoweather ([random].vbs)
絕對不需要的程式
Detected by Malwarebytes as Trojan.StartPage. The file is located in %ProgramFiles% - see examples here and here
eodesk ([random].vbs)
絕對不需要的程式
Detected by Malwarebytes as Trojan.StartPage. The file is located in %ProgramFiles% - see an example here
eophoto ([random].vbs)
絕對不需要的程式
Detected by Malwarebytes as Trojan.StartPage. The file is located in %ProgramFiles% - see examples here and here
eost ([random].vbs)
絕對不需要的程式
Detected by Malwarebytes as Trojan.StartPage. The file is located in %ProgramFiles% - see an example here
eventLog ([trojan filename].exe)
絕對不需要的程式
Detected by Trend Micro as TROJ_DROPPER.EAT. The file is located in %LocalAppData% - see the link for the list of potential filenames